<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>port &#8211; lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</title>
	<atom:link href="https://lifelinux.com/tag/port/feed/" rel="self" type="application/rss+xml" />
	<link>https://lifelinux.com</link>
	<description>All About Linux !</description>
	<lastBuildDate>Thu, 31 Jan 2013 01:00:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.3</generator>
	<item>
		<title>Repel port flood by CSF and IPT_Recent</title>
		<link>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/</link>
					<comments>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/#comments</comments>
		
		<dc:creator><![CDATA[Linux Killer]]></dc:creator>
		<pubDate>Thu, 31 Jan 2013 00:58:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WebServer]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Flood]]></category>
		<category><![CDATA[flood attack]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[protocol]]></category>
		<category><![CDATA[servers]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1480</guid>

					<description><![CDATA[<p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server. So How to Make a flood attack ? Logically flood attacks are two ways : first through a specific [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server.</p>
<p><span id="more-1480"></span><br />
<strong>So How to Make a flood attack ?</strong><br />
Logically flood attacks are two ways :<br />
first through a specific communication<br />
the second through multiple connections each connection of these connections connect with the provider<br />
<strong>Requirements</strong></p>
<ol>
<li>Installing firewall CSF last version</li>
<li>Enabled IPT and works well</li>
<li>Model IPT_Recent special for IPT</li>
</ol>
<p><strong>Application</strong></p>
<p>Through edited the configuration file special for CSF it is located in the following path:</p>
<pre>root@server:$ nano /etc/csf/csf.conf</pre>
<p>We pressing CTRL + W and look for PORTFLOOD we will find the line as follows default :</p>
<pre>PORTFLOOD = " "</pre>
<p>put inside ” ” Settings that we want ,as in the following example:</p>
<pre>PORTFLOOD = "80;tcp;20;10"</pre>
<p>80 is the port , TCP is the protocol , 20 is the number of connections allowed at the same time , 10 is time of pause temporarily after the 10 seconds is allowed IP make new contacts</p>
<p><strong>Important note: </strong>ipt_recent can count 20 Packets for each Title , So you can change the number of connections from 1 to 20 only</p>
<p>Is there a possibility of adding more than one port ?yes be as follows (Just an example) :</p>
<pre>PORTFLOOD = "22;tcp;10;200,21;tcp;15;100,80;tcp;20;5"</pre>
<p><strong><span style="color: #000000;">Note</span> </strong>that when we add a new port we put a comma (,)</p>
<p>In the previous example you choose more than one port are 22, 21 and 80 And you can add more and you can change the number of connections and also change the protocol type, for example, from TCP to UDP after the completion of the edited we save the file : CTRL + X, Y, and then Enter button.</p>
<p>Finally, do not forget to restart CSF with the following command:</p>
<pre>root@server:$ csf -r</pre>
<p>Thank You ,,</p>
<g:plusone href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
